参考文献
[1]Toffler A.The Third Wave[M].New York:Bantam Doubleday Dell Publishing Group Inc, 1980.
[2]Bryson S, Kenwright D, Cox M, et al.Visually Exploring Gigabyte Data Sets in Real Time[J].Communications of the ACM, 1999, 42(8):82-90.
[3]Manyika J, et al.Big data:The next frontier for innovation, competition, and productivity[R].Mckinsey report, 2011.
[4]单志广.《促进大数据发展行动纲要》解读[EB/OL].[2018].http://www.sic.gov.cn/News/609/9713.htm.
[5]孔令远.2018年全球互联网发展数据分析[EB/OL].[2019].https://zhuanlan.zhihu.com/p/33743132.
[6]Kumar P R, Herbert Raj P, Jelciana P.Exploring Security Issues and Solutions in Cloud Computing Services -A Survey[J].Cybernetics and Information Technologies, 2017, 17(4):3-31.
[7]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016, 42(4):481-494.
[8]董宁,朱轩彤.区块链技术演进及产业应用展望[J].信息安全研究,2017, 3(3):200-210.
[9]区块链3.0研究院.区块链3.0 共识蓝皮书[EB/OL].[2018].https://www.docin.com/p-2136354892.html.
[10]Swan M.Blockchain:Blueprint for a New Economy[M].NY:O'Reilly Media, 2015.
[11]Toyoda K, Mathiopoulos P T, Sasase I, et al.A Novel Blockchain-Based Product Ownership Management System(POMS)for Anti-Counterfeits in the Post Supply Chain[J].IEEE Access, 2017, 5:17465-17477.
[12]屈华民.大数据时代的可视化与协同创新[J].新美术,2013, 11:21-27.
[13]韩璇,袁勇,王飞跃.区块链安全问题:研究现状与展望[J].自动化学报,2019, 45(1):206-225.
[14]中国信息通信研究院和中国通信标准化协会.区块链安全白皮书——技术应用篇[EB/OL].[2018].https://www.colabug.com/4595142.html.